Limit Search Results
Author
Language
Subject
Switch to list view
Switch to thumbnail view
2615 Results Found Subscribe to search results
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000MAIN
Print
304. 
Cover image for Security management : a critical thinking approach
306. 
Cover image for Information security management handbook Volume 7
307. 
Cover image for Cryptography and network security : principles and practice
310. 
Cover image for Principles of incident response and disaster recovery
335. 
Cover image for Applied network security monitoring : collection, detection, and analysis
339. 
Cover image for Access control, authentication, and public key infrastructure
342. 
Cover image for Core software security : security at the source
343. 
Cover image for The science and technology of counterterrorism : measuring physical and electronic security risk
344. 
Cover image for The basics of information security : understanding the fundamentals of InfoSec in theory and practice
346. 
Cover image for Analyzing security, trust, and crime in the digital world
349. 
Cover image for Organizational, legal, and technological dimensions of information system administration
350. 
Cover image for Security, privacy, trust, and resource management in mobile and wireless communications
357. 
Cover image for A cryptography primer : secrets and promises
358. 
Cover image for What every engineer should know about cyber security and digital forensics
359. 
Cover image for The Intrusion detection networks : a key to collaborative security
360. 
Cover image for Responsive security  : be ready to be secure
361. 
Cover image for The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory
362. 
Cover image for CompTIA security+ review guide : exam sy0-401
363. 
Cover image for Collaboration with cloud computing : security, social media, and unified communications
364. 
Cover image for Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
368. 
Cover image for Digital forensics for handheld devices
384. 
Cover image for UTM security with Fortinet : Mastering FortiOS
392. 
Cover image for Risk propagation assessment for network security : application to airport communication network design
393. 
Cover image for Information security
399. 
Cover image for Intelligent systems for security informatics
401. 
Cover image for Computer forensics : infoSec Pro guide
402. 
Cover image for Malware, rootkits & botnets : a beginner's guide
409. 
Cover image for Information security for managers
431. 
Cover image for Security risks in social media technologies : safe practices in public service applications
434. 
Cover image for Introduction to computer networks and cybersecurity
437. 
Cover image for Trust, privacy, and security in digital business : 10th International conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013 : proceedings
439. 
Cover image for Digital forensics explained
441. 
Cover image for Hacking for dummies
442. 
Cover image for Cryptography in C and C++
444. 
Cover image for The basics of web hacking : tools and techniques to attack the Web
445. 
Cover image for Cyber warfare : techniques, tactics and tools for security practitioners
446. 
Cover image for Eleventh hour CISSP : study guide
449. 
Cover image for Arguments that count : physics, computing, and missile defense, 1949-2012
450. 
Cover image for Web penetration testing with kali linux : a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocol with kali linux
451. 
Cover image for Sailing safe in cyberspace : protect your identity and data
461. 
Cover image for Android security : attacks and defenses
467. 
Cover image for Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
468. 
Cover image for Cyberspace and cybersecurity
469. 
Cover image for Network anomaly detection : a machine learning perspective
471. 
Cover image for Business data communications : infrastructure, networking and security
472. 
Cover image for Web application defender's cookbook : battling hackers and protecting users
506. 
Cover image for FISMA and the risk management framework : the new practice of federal cyber security
507. 
Cover image for Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols
509. 
Cover image for Multimedia information hiding technologies and methodologies for controlling data
511. 
Cover image for Management of information security
512. 
Cover image for Information security risk assessment toolkit :   practical assessments through data collection and data analysis
513. 
Cover image for The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice
514. 
Cover image for The hacker's guide to OS X : exploiting OS X from the root-up
517. 
Cover image for Discrete dynamical systems and chaotic machines : theory and applications
518. 
Cover image for Elementary information security
519. 
Cover image for Cyber security for educational leaders : a guide to understanding and implementing technology policies
529. 
Cover image for Applied cyber security and the smart grid : implementing Security Controls into the Modern Power Infrastructure
546. 
Cover image for Linux Malware Incident Response : a practitioner's guide to forensic collection and examination of volatile data  : an excerpt from Malware Forensic Field Guide for Linux Systems
547. 
Cover image for Professional penetration testing
551. 
Cover image for Engineering dependable software systems
566. 
Cover image for Software safety and security : tools for analysis and verification
571. 
Cover image for Client-side attacks and defense
572. 
Cover image for Hacking web apps : detecting and preventing web application security problems
573. 
Cover image for Advances in intelligence and security informatics
575. 
Cover image for The computer incident response planning handbook : executable plans for protecting information at risk
580. 
Cover image for Information security management handbook
585. 
Cover image for CCNA security course booklet.
586. 
Cover image for Staying safe online in simple steps
587. 
Cover image for Cybersecurity : public sector threats and responses
591. 
Cover image for Computing and communication
592. 
Cover image for CCNA security lab manual version 1.1
593. 
Cover image for iOS hacker's handbook
594. 
Cover image for Role mining in business : taming role-based access control administration
595. 
Cover image for A survey of data leakage detection and prevention solutions
596. 
Cover image for Threats, countermeasures, and advances in applied information security
597. 
Cover image for PCI compliance :  understand and implement effective PCI data security standard compliance
598. 
Cover image for Reliability and availability of cloud computing
599. 
Cover image for Information security management handbook Volume 6
Go to:Search Results
|
Top of Page
|
Search Facets